1.15.4 Credential Management
Going beyond Encryption, explicit credential management will provide credentials to your builds for a brief amount of time, without being persisted anywhere. It also allows for credentials to be rotated and managed external to the pipeline or team, and prevents them from being revealed by fly get-pipeline
.
Credential management works by replacing the credentials with ((vars))
in your pipeline or task config. When the Concourse is about to run the step or check
that is configured with vars, it will resolve them by fetching the values from the credential manager. If the values are not present, the action will error.
The following configurations can be parameterized with a credential manager:
task
stepparams
on a task step in a pipelineTasks in their entirety - whether from
task
stepfile
ortask
stepconfig
in a pipeline, or a config executed withfly execute
Where these values are looked up and how the credential manager is configured depends on the backend. Consult the relevant section below for whichever backend you want to use.
- 1.15.4.1 The Vault credential manager
- 1.15.4.2 The CredHub credential manager
- 1.15.4.3 The AWS SSM credential manager
- 1.15.4.4 The AWS Secrets Manager credential manager
- 1.15.4.5 Kubernetes Credential Manager
- 1.15.4.6 The Conjur credential manager
- 1.15.4.7 Caching credentials
- 1.15.4.8 Redacting credentials
- 1.15.4.9 Retrying failed fetches